Halloween Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

LPI 101-500 - LPIC-1 Exam 101, Part 1 of 2, version 5.0

Page: 3 / 9
Total 293 questions

Which parameter of the ssh command specifies the location of the private key used lor login attempts? (Specify ONLY the option name without any values or parameters)

Given the following input stream:

txt1.txt

atxt.txt

txtB.txt

Which of the following regular expressions turns this input stream into the following output stream?

txt1.bak.txt

atxt.bak.txt

txtB.bak.txt

A.

s/^.txt/.bak/

B.

s/txt/bak.txt/

C.

s/txt$/bak.txt/

D.

s/^txt$/.bak^/

E.

s/[.txt]/.bak$1/

Which of the following commands lists all defined variables and functions within Bash?

A.

env

B.

export

C.

env -a

D.

set

E.

echo $ENV

A faulty kernel module is causing issues with a network interface card. Which of the following actions ensures that this module is not loaded automatically when the system boots?

A.

Using lsmod --remove --autoclean without specifying the name of a specific module

B.

Using modinfo –k followed by the name of the offending module

C.

Using modprobe –r followed by the name of the offending module

D.

Adding a blacklist line including the name of the offending module to the file /etc/modprobe.d/blacklist.conf

E.

Deleting the kernel module’s directory from the file system and recompiling the kernel, including its modules

How do shadow passwords improve the password security in comparison to standard non-shadow passwords'?

A.

Regular users do not have access to the password hashes of shadow passwords

B.

Every shadow password is valid for 45 days and must be changed afterwards

C.

The system's host key is used to encrypt all shadow passwords.

D.

Shadow passwords are always combined with a public key that has to match the user's private key

E.

Shadow passwords are stored in plain text and can be checked for weak passwords

What information is shown by the echo $ ? command?

A.

The process ID of the echo command

B.

The exit value of the command executed immediately before echo.

C.

The process ID which will be used for the next command

D.

The exit value of the echo command

E.

The process ID of the current shell

Which directory holds configuration files for xinetd services? (Specify the full path to the directory)

Which of the following properties of a Linux system should be changed when a virtual machine is cloned? (Choose two.)

A.

The partitioning scheme

B.

The file system

C.

The D-Bus Machine ID

D.

The permissions of /root/

E.

The SSH host keys

Which of the following commands is used to change options and positional parameters for a running Bash?

A.

history

B.

set

C.

bashconf

D.

setsh

E.

envsetup

Regarding the command:

nice -5 /usr/bin/prog

Which of the following statements is correct?

A.

/usr/bin/prog is executed with a nice level of -5.

B.

/usr/bin/prog is executed with a nice level of 5.

C.

/usr/bin/prog is executed with a priority of -5.

D.

/usr/bin/prog is executed with a priority of 5.